Security and trust
Work confidently using reliable and secure enterprise technology.
Information security controls
The Checkbox platform is highly secure with layers of technical and operational controls in place to protect information. Checkbox maintains an Information Security Management System as part of its governance framework which includes policies and procedures around network security, information handling and data security, access control, incident response, backups, change management, risk management, vulnerability/patch management, & vendor risk management.
Encryption of Data at Rest and In Transit
Automated Security Patching
Network-based Intrusion Detection Systems (NIDS)
Regular Web Application Penetration Testing
Regular Automated Vulnerability Scanning
Hardened Standard Operating Environment Images
Firewall Policies at the Host and Service Level (Micro Network Segmentation)
Monitoring and Logging of All Administrative Access & Network Traffic Flows
Checkbox is SOC 2 Certified
Checkbox has been externally audited against the security requirements of the SOC 2 framework, and has achieved SOC 2 Type II certification.
Trusted by companies of all sizes, worldwide
Access our security documents
Get in touch to request Checkbox's security documents including policies, penetration tests and SOC2 audit reports.